Static task
static1
Behavioral task
behavioral1
Sample
9b1c0dba1ec34b17d8b03966ed75295875ee08cfcad01a9627036fca9e8f77dd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9b1c0dba1ec34b17d8b03966ed75295875ee08cfcad01a9627036fca9e8f77dd.exe
Resource
win10v2004-20220812-en
General
-
Target
9b1c0dba1ec34b17d8b03966ed75295875ee08cfcad01a9627036fca9e8f77dd
-
Size
116KB
-
MD5
df088fdbb20d54bed98562cf2b7fc18e
-
SHA1
f74d198c422c2e76b15365c125864762ac28faaf
-
SHA256
9b1c0dba1ec34b17d8b03966ed75295875ee08cfcad01a9627036fca9e8f77dd
-
SHA512
58b0968195c8f6ba4fbbd8a201602d37071ef5a0d99267ad5720196fe3b2f7eb60e4728d120101cb04d898f38fbd5f3f24a3cd1bf94e64303a6c6e4f3542c675
-
SSDEEP
3072:FxXYyDQ13T4EhIlDjoUQU5WHchKCK3n0P:FxQ4EhIxoUN5WHc5Kk
Malware Config
Signatures
Files
-
9b1c0dba1ec34b17d8b03966ed75295875ee08cfcad01a9627036fca9e8f77dd.exe windows x86
48ffd0df7b278acad4a131dcedd84fe9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TransactNamedPipe
LockResource
DeleteCriticalSection
CopyFileA
RegisterConsoleIME
GetStringTypeExA
HeapDestroy
AddConsoleAliasA
GetCommandLineA
ExitProcess
GetStartupInfoA
Sections
.rc3sec0 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rc3sec1 Size: - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rc3sec2 Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rc3sec3 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ